DIPLOMA IN CYBER SECURITY

 

 

DATASPACE SECURITY                             Collaboration with                                  SAI COMPUTER EDUCATION

 

SEMESTER 1

NETWORKING FOR ETHICAL HACKING

NETWORK BASICS

What is Computer Network?

Computer Network Formation

Types of Network

Usages of Computer Network

Classification of Computer Network

What is Network Packets?

Introduction to IPV4 and IPV6

OSI & TCP/IP MODE

What is OSI Model?

Layers of OSI Model ?

What is TCP/IP Model?

Layers of TCP/IP Model ?

NETWORK TOPOLOGY

What is Network Topology?

Types of Network Topology

Classification of Network Topology

What is Underlay Network?

What is Overlay Network?

TRANSMISSION MEDIA & NETWORK DEVICE

What is Transmission Media?

Wired Medium

Wireless Medium

What is Nic Card?

Repeaters and Hubs

Bridge and Switches

Router

Firewalls

PORTS & PROTOCOL

What is TCP?

What is UPD?

What is HTTP?

What is FTP?

What is TFTP?

What is SMTP?

What is POP?

What is ICMP?

What is RDP?

IP SUBNETTING

IP Addressing

Classification of ip Address

IPV4 and IPV Subnets

IP Sub netting

Troubleshooting IP Addressing

                                                                          SEMESTER 2 

                                                 PYTHON PROGRAMMING

 

INTRODUCTION TO PYTHON PROGRAMMING

Python Programming Course in Kolkata is A Famous Programming Language Python Was Made By Guido Van Rossum and Delivered in 1991.it is utilized For web Advancement ( Worker Side),Programming Improvement, Arithmetic, Framework  Scripting.it Very Well May Be Utilized to Deal With Large information and Perform Complex Arithmetic it Can Likewise be Utilized for Fast Prototyping , or for Creation-Prepared Programming advancement.

DATA TYPES AND VARIABLES

A Variable Can be Considered as A Memory area That Can Hold Estimations of A Particular Kind The Worth in A Variable May Change During The existence of The Program-Henceforth The Name “Variable. “Variable Information is characterized as Numeric Data Types in Python and Figures Used To Assemble Control Outlines.

DECISION MAKING AND CONDITINAL STATEMENT

Dynamic Designs Necessitate That The Software Engineer Indicates at Lest one Condition to be assessed or Tried by the Program ,Alongside an assertion or Articulations to be Executed to be Valid, and Alternatively , Different Proclamations to be Executed if the Condition is Resolved to be Bogus.

LOOPING

A Looping is Utilized For Executing a Square of Articulations Over and Over Until A Specific Condition is fulfilled.

TUPLES AND DICTIONARIES

A Dictionary is A Hasa Table of Key-Esteem Sets. Rundown and Tuple is an Arranged Assortment of Things.

USER-DEFINED FUNCTIONS

A User-Defined Function is A Square of Code That Plays out A Particular Assignment. These Capacities are Known as Client Characterized Capacities.

MODULES AND USER-DEFINED PACKAGES

A Module is A Document Containing Python Code. A Bundle, Notwithstanding, Resembles A Catalog That Holds Sub-Bundles and Modules.

OBJECTED ORIENTED PROGRAMMING

OOP Represents Object-Oriented Programming Python Course. Procedural Writing Computer Programs are Tied in With Composing Techniques or Capacities That Perform the Procedure on the Information, While Object-Arranged Writing Computer Programs are Tied in With Making Objects That Contain Both Information and Capacities

EXCEPTIONAL HANDLING

An Exceptional Handling is an Occasion, Which happens during the Execution of a Program That Disturbs the Typical Progression of The Program’s Directions. All in all, when A Python Content Experiences A Circumstance that it Can’ adapt to, it Raises an Exemption. An Exceptional Handling is A Python objet that addresses A Blunder.

FILE HANDLING Python also Upholds File Handling and Permits Clients to Deal with Records I.E., to Peruse and Compose Records, Alongside Numerous Other File Handling Python Alternatives, to Work on Documents.

SOKET AND NETWORK PROGRAMMING

Socket And Network Programming Is One Of The Best Python Programming Course. It Is A Method Of Associating Two Hubs On An Organization To Speak With One Another. One Socket (NODE) Tunes In On A Specific Port At An IP, While The Other Attachment Contacts The Other To Frame An Association.

GUI PROGRAMMING USING PYTHON

Python GUI Programming Course Gives Different Alternatives To Creating Graphical UIS (GUIS). A Graphical UI Is An Application That Has Catches, Windows, And Bunches Of Different Gadgets That The Client Can Use To Interface With Your Application By Learning Python GUI Programming Course.

CREATING HACKING TOOLS USING PYTHON

There Are A Lot Of Tools Available For Python, But With This Course, You Will Be Able To Make Your Own Tools.

PROJECT

You Can Utilize Python For Web Advancement, Information Science, Work Area Applications, And The Sky’s The Limit From There, With So Numerous Choices , It Very Well May Be Difficult To Pick Your Next Project Thought.

                                                                    SEMESTER-3 

                                                              ETHICAL HACKING

 

INTRODUTION

Lecture 1:- What is hacking

Lecture 2:- What is ethical hacking

Lecture 3:- Type of hacking

Lecture 4:-White hat hacker

Lecture 5:-Black hat hacking

Lecture 6:-Grey hat hacking

Lecture 7:-Script kiddies

Lecture 8:- Hacktivists

Lecture 9:- Spy hackers

Lecture 10:-cyber terrorists

Lecture 11:-Vulnerability

Lecture 12:- Exploit

Lecture 13:- Remote Exploit

Lecture 14:- Local Exploit

Lecture 15:- Aero-Day

Lecture 16:- Zero-Day Vulnerability

Lecture 17:- Zero-Day Exploit

Lecture 18:- Brute Force Attack

Lecture 19:- Phishing

Lecture 20:- Remote Access

Lecture 21:- Payload

Lecture 22:- Information gathering

Lecture 23:- Active Information gathering

Lecture 24:- Passive Information Gathering

Lecture 25:- Scanning

Lecture 26:- Gaining Access

Lecture 27:- Maintaining Access

Lecture 28:- Covering Tracks

Lecture 29:- Viruses & Worms

Lecture 30 :- Trojan Horse

Lecture 31:- Spyware

Lecture 32:- Adware

Lecture 33:- backdoor

Lecture 34:- Root kits

Lecture 35:- Ransom ware

Lecture 36:- What is Penetration Testing

Lecture 37:- Types of Penetration Testing

Lecture 38:- What is White Box Penetration testing

Lecture 39:- What is Black Box Penetration Testing

Lecture 40:- Introduction To Linux  OS

Lecture 41:- Social engineering

Lecture 42:- Google Hacking Using Google Dorks

LAB SETUP AND CONFIGURATION

 Lecture 43:-What is Virtual Machine

Lecture 44:-What is VMware

Lecture 45:-What is Virtual Box

Lecture 46:-Install VMware

Lecture 47:-Install  VMware

Lecture 48:-Install Windows Os

SYSTEM HACKING

Lecture 49:-Vulnerability Scanning Using Nessus

Lecture 50:-Exploit Using Metasploit

Lecture 51:-Network Scanning Using Nmap

Lecture 52:-Windows 10 Hacking

Lecture53:-Windows 10 UAC Bypass

SOCIAL ENGINEERING

Lecture 54:-Phishing Attack

Lecture 55:-Setoolkit Usages

Lecture 56:-Rat ( Remote Access Trojan)

Lecture 57:-Using Rat Hack Systems

Lecture 58:-Ngrok Usages

Lecture 59:-Android Phone Hacking

WIFI HACKING

Lecture 60:-WI-Fi Encryption

Lecture 61:-Hack WI-Fi Access Point

Lecture 62:-Dos Attack

Lecture 63:-DDOS Attack

WEB APPLIATION PENTESTING

Lecture 64:-How Web Application Works

Lecture 65:-Request and Response

Lecture 66:-Installing Scanner ( Acuntix , Netsparker) Scanning

Lecture 67:-Website Basic

Lecture 68:-Owasp Top 10

Lecture69:-What is SQL-Injection?

Lecture 70:-Types of –Injection

Lecture 71:- Live Demo on SQL-Injection

Lecture 72:-What is Xss

Lecture 73:-Types of Xss

Lecture 74:-Live Demon on Xss All Types

Lecture 75:-What is HTML Injection

Lecture 76:-Live Demo on HTML Injection

Lecture 77:-What is Directory Listing

Lecture 78:-Live Demo on Directory Listing

Lecture 79:-What is Broken Authentication

Lecture 80:-Live Demo on Broken Authentication

Lecture 81:-What is Tamper Data?

Lecture 82:-Live Demo an Tamper Date on Ecommerce Site

Lecture 83:-What is Shell

Lecture84:-Hack Web –Server Using Web-Shell

                                                                  SEMESTER 4

                                              WEB APPLICATION PENETRATION TESTING

 

UNDERSTANDING HTML& LAB SETUP

Web Application Structure

HTML Request and Response

Lab Setup

Install Xampp Server

Setup Vulnerable Web Application

Setup Dvwa

Setup Bwapp

Setup Webgoat 7.1

Setup Burp-Suite

Setup Burp-Suite Ca Certificate

Setup Firefox old Version (40.0) With No-Redirect

Addon

Setup Netsparker

Setup Acunetix

Setup Vm-Ware

Install Kali-Linux

OWASP TOP 10 & SQL-INJETION

Owasp Top 10 & Sql-Injection

Setup Vulnerable Web Application

Setup Dvwa

Setup Bwapp

Sql-Injection What is Sql Injection? How You Can Find Out Sql Injection Vulnerability In Website? What is Get Method?

How You Can Find Out Sql-Injection Vulnerability In Get Parameter? How You Can Exploit That Vulnerability What is Sqlmap and How You Can Use it? What is Post Method?

How You Can Find Out Sql-Injection Vulnerability In Post Parameter? How You Can Bypass Login Page Auth Using Sql-in Jection Vulnerability? How You Can Use Different Types of Payload To Bypass Login Page?

CROSS SITE SCRIPTING – XSS

What is intruder? How You Can use it? Cross Site Scripting ( XSS) What is Cross Site Scripting Vulnerability?

Where You Can Find Out XSS Vulnerability? Types of XSS? Details of Persistence XSS Details of N-Persistent XSS

Details of Dom Based XSS XSS Demo on Live Website Cookie Stealing Using XSS Vulnerability

ROSS SITE REQUEST FORGERY (CRSRF)

Cross Site Request Forgery (CSRF) what is CSRF?

Where You Can Find out CSRF Vulnerability? CSRF Live Demo on Get Method CSRF Live Demo on Post Method

DIFFEENT TYPES OF INJECTION

Different Types of injection What is Command injection? Live Demo on Command injection What is Code injection What is X-Path injection? Live Demo on X-Path injection What is Ldap injection? What in HTML injection Live Demo on HTML injection What is XXE? Live Demo on THML injection What is XXS? Live Demo on XXS What is XXE? Live Demo on XXE Whet is XML-injection Security Misconfiguration What is  is Security Misconfiguration? +What is Directory Listing ? Live Demo on Directory Listing Vuulnerability What is Core?

Live Demo on Course What is Option Method? How it’s Effect?

Session hijacking what is Sessions? How We can Bypass the Session?

Use Burp Sequencer How we Can Generate Sessions?

WBSRVER HECKING & BURP-SUITE

Web shell or Webserver Hacking What is Web shell? How You Can Hack Webserver Using Web shell?

How you Can Bypass Client Side Validation and Uploading Web shell? How You Can Bypass Content Type Validation and Uploading Web shell? What is RFI and Using RFI How You Can Access Web Server? Using Weevely How You can Upload Web shell? Burp Suite Manual Testing Using Burp Suite How You Can do Manual Testing? What is Spider How You Can Use it? What is Intruder How You Can Use It? What is Repeater How You Can Use It? What is Sequencer How You Can Use It? What is Decoder How You Can Use It? What is Compare How You Can Use It? What is Extender How You Can Use It?

VULNERABILITY SCANNING     

Vulnerability Scanner Automation Testing, Using Scanner How You Can Do Automation Testing? What is Netsparkar How You Can, Use it? URL Redirect and Forward what is Url Redirect and Forward? Insecure Deserialization What is Insecure Deserialization? Using Components with Known Vulnerabilities What is Using Components With Known Vulnerabilities? Insufficient Logging and monitoring what is Insufficient Logging and Monitoring? Broken Authentication what is Broken Authentication? How You Can Bypass Post Login Page Without Valid Sessions? How You Can Use No-Redirect Add-On? Broken Access Control What is Broken Access Control? Live Demo on Broken Access Control

                                                                                 SEMESTER 5

                                                   NETWORK PENETRATION TESTING

 

INTRODUCTION TO NETWORK PENETRATION TESTING

It is a Process of Identifying and prioritizing the Vulnerabilities in A Target. Pen Tests Include an Assortment of Approaches Intended To Investigate an organization to Distinguish Possible Weaknesses and Test to Guarantee the Weaknesses are Genuine

LAB SETUP 

A Hypervisor or Cloud Climate to Have Your Machines an Objective Machine-A Machine You Will Check, Find Ports, Administrations, and Weaknesses. And Afterward Dispatch Assaults on.

DEEP INFORMATION GATHERING

Information Gathering is The Demonstration of Social occasion Various Types of Data Against

The Focus on Casualty or Framework.

GETTING INTO SYSTEM

It is one of the Most Important Steps in Network Penetration. Getting Into A System Leads You To The Next Step.

ANDROID HACKING

It is the Practice of Controlling or Acquiring Unapproved Admittance to Cell Phones, For Example, by Catching Calls Phones, For Example, By Catching Calls Draw Clients to Download Applications from Untrusted Sources. These Android Hacking  Apps May Contain Malicious Programming Inside Them, Giving the Aggressor Far off Admittance to Hack Android Phones When The Apk is Introduced By The client it the Point When the Clients Click That Specific Connection in the Message They Might Be Diverted to A Malignant Site Parting With Their Delicate Data or May Prompt Monetary Misfortune. Or Can Also Hack WI-Fi Passwords Online and Android Devices.

SNIFFING AND MITM

Mitm is A Class of Assault and Sniffing is Just the Word For Examining Bundles of The Organization.

ANONYMITY

The Quality or Condition of Being Unknown Delighted in the Secrecy of Life in an Enormous City. Basically Comprehended Somebody is Mysterious if His / Her

Anonymous Function Isn’t Known.

SOCIAL ENGINEERING

Social Engineering in Cyber Security is The Craft of Controlling Individuals so They Surrender Secret Data. Social Engineering Techniques is the Specialty of Abusing Human Brain Research, Instead of Specialized Hacking Strategies, to Access Structures, Frameworks, or Information.

ATTACKING WIFI NETWORK

Normally Known as Remote Organization Assaults, Infiltration and Interruption Acts That Target Remote Organizations Present Genuine Dangers.

WIFI AS AN ATTACK VECTOR

Generally Known as Remote Organization Assaults, Infiltration, and Interruption Acts That Target Remote Organizations Present Genuine Dangers. You Can Also Learn WI-FI Network Hacking

 

 

 

  • 3 Months Internship Program after the Course
  • Group Discussions with LIVE PROJECT
  • Whats App Group Tech Support
  • Placement Support
  • World Recognized Certificate
  • 100% Practical Live Classes (Both Online & Offline)
  • Lifetime Access To Data Space Lab With Unique Login Id & Password

for (100 + Videos  &  50+ PDF)

  • Classes Conduct by Best Industry Experts
  • Pocket Friendly With Easy EMI Option    

 

 

DATASPACE SECURITY                         Collaboration with                                    SAI COMPUTER EDUCATION